US12192357B2 - Device and location authentication for secure patient monitoring - Google Patents
Device and location authentication for secure patient monitoring Download PDFInfo
- Publication number
- US12192357B2 US12192357B2 US17/740,776 US202217740776A US12192357B2 US 12192357 B2 US12192357 B2 US 12192357B2 US 202217740776 A US202217740776 A US 202217740776A US 12192357 B2 US12192357 B2 US 12192357B2
- Authority
- US
- United States
- Prior art keywords
- local hub
- management server
- device management
- medical devices
- encrypted message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000012544 monitoring process Methods 0.000 title claims description 6
- 238000004891 communication Methods 0.000 claims description 22
- 238000000034 method Methods 0.000 claims description 15
- 230000008878 coupling Effects 0.000 claims description 2
- 238000010168 coupling process Methods 0.000 claims description 2
- 238000005859 coupling reaction Methods 0.000 claims description 2
- 238000012806 monitoring device Methods 0.000 description 20
- 230000001413 cellular effect Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- WQZGKKKJIJFFOK-GASJEMHNSA-N Glucose Natural products OC[C@H]1OC(O)[C@H](O)[C@@H](O)[C@@H]1O WQZGKKKJIJFFOK-GASJEMHNSA-N 0.000 description 1
- QVGXLLKOCUKJST-UHFFFAOYSA-N atomic oxygen Chemical compound [O] QVGXLLKOCUKJST-UHFFFAOYSA-N 0.000 description 1
- 239000008280 blood Substances 0.000 description 1
- 210000004369 blood Anatomy 0.000 description 1
- 230000036772 blood pressure Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 239000008103 glucose Substances 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 229910052760 oxygen Inorganic materials 0.000 description 1
- 239000001301 oxygen Substances 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H40/00—ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
- G16H40/40—ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the management of medical equipment or devices, e.g. scheduling maintenance or upgrades
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H80/00—ICT specially adapted for facilitating communication between medical practitioners or patients, e.g. for collaborative diagnosis, therapy or health monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/037—Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
Definitions
- Telehealth and Remote Patient Monitoring devices can potentially expose user's health data and are targets of hackers to gain access to patient data and network intrusion. This is especially problematic since many monitoring devices are now capable of wireless communications. Thus, a need exists for a system and method to secure and authenticate users and devices throughout the entire system.
- a local hub maintains a secure and isolated connection with a device management server for reporting clinical data received from connected medical devices. Only authorized medical devices can communicate with the local hub and a list of allowed medical devices is managed by using a clinical application. A wearable device may be utilized to ensure that the user is within an acceptable range of the local hub.
- FIG. 1 depicts a network diagram of the remote monitoring system of the present invention.
- FIG. 1 depicts a network diagram of remote monitoring system 100 according to an embodiment of the present invention.
- a plurality of monitoring devices 102 a . . . 102 n are coupled to local hub 104 .
- the monitoring devices 102 a - 102 n are preferably wirelessly coupled to local hub 104 via a communication standard such as Bluetooth, Wi-Fi, or multiple simultaneous connections.
- local hub 104 is also capable of directly coupling to monitoring devices by wire if needed (e.g., USB) if support of legacy monitoring devices is required.
- the monitoring devices 102 a - 102 n may be any devices capable of measuring any number of vital signs of a user which may include, but are not limited to, blood pressure, weight, blood oxygen level, glucose levels, etc.
- Local hub 104 is preferably a touch screen style device with/without a keyboard. This allows users to easily set up and connect monitoring devices 102 a - 102 n . Further, as most users are now familiar with touch screen interfaces, even elderly or less computer literate people can use local hub 104 easily.
- Local hub 104 may employ a custom operating system, only allowing it for use with remote monitoring system 100 , or may be controlled via an application running on a smartphone or tablet.
- Preferably local hub 104 is capable of various types of wireless communication including cellular, Wi-Fi, and Bluetooth.
- Local hub 104 preferably may incorporate a GPS sensor so that the exact location of the local hub 104 can constantly be monitored.
- Local hub 104 collects the data from the monitoring devices 102 a - 102 n , formats the data, and transmits it to a device management server 106 over internet 108 .
- the device management server 106 stores data for a plurality of patients, each of which has their own unique local hub 104 .
- a clinician can view the stored data on device management server 106 using clinical application 110 .
- the clinician can also use clinical application 110 to send messages to patients using local hub 104 (e.g., voice or text) and can also configure settings for the various monitoring devices 102 a - 102 n if necessary. This allows the clinician to control the settings for the monitoring devices 102 a - 102 n because users likely would not be familiar with the requirements of configuring monitoring devices 102 a - 102 n past an initial setup.
- Wireless scale 102 a is preferably coupled to local hub 104 remotely using each device's unique identifier without a human in the loop.
- Local hub 104 is coupled to device management server 106 with 2-factor authentication over internet 108 .
- Employing 2-factor (or more authentication for each connection) greatly reduces and/or eliminates the possibility of any information being hacked.
- each local hub 104 sends a service request including an identifier unique to local hub 104 to device management server 106 over internet 108 .
- the device management server 106 responds with a communication via another communication channel, such as by using an SMS with a challenge payload sent over a cellular network.
- the local hub 104 captures the SMS, extracts the payload (preferably encrypted), and sends a return IP message over Internet 108 with the payload.
- the return IP message could also be sent using SMS, but utilizing different wireless communication channels helps to reduce the possibility of information being intercepted.
- the device management server 106 can authenticate the local hub 104 as a valid device that is retained in a database of approved devices stored on device management server 106 (e.g., using the identifier).
- the described process can also be carried out each time that local hub 104 communicates with device management server 106 or it can occur randomly or according to a set schedule.
- Device management server 106 may also utilize other forms of authentication, such as requiring local hub 104 to self-report its GPS location (or cellular triangulation) or it can send any WiFi SSIDs it “sees” and the device management server 106 can determine the location. Communication between local hub 104 and device management server 106 is only allowed if local hub 104 is within a certain range of set GPS locations. For example, a first GPS location could be a user's home and a second GPS location may be a user's work, wherein the user moves the local hub 104 from location to location as needed. If the reported GPS location is not within a predetermined distance of each GPS location, communication is restricted.
- any further communication may be restricted until allowed by a clinician using clinical application 110 or a device management application. This may be an indication the local hub 104 has been lost or stolen and no further communication should be allowed.
- a remote wipe of local hub 104 may also be enabled by a clinician in these situations.
- each monitoring devices 102 a - 102 n are coupled to local hub 104 via a Bluetooth connection. This requires devices to be paired and within a relatively short range of each other in order for communication to occur, which already provides a limited form of authentication.
- each monitoring devices 102 a - 102 n may be assigned a unique passkey which is not shown on a display of the monitoring device 102 a - 102 n or contained on its packaging.
- the passkey can be set for each device by a clinician using clinical application 110 .
- the user would also need to enter the passkey assigned by the clinician. This helps to prevent monitoring devices 102 a - 102 n with being paired with other local hubs 104 , especially since the passkey can be changed.
- each user may be given a separate and unique wearable 112 that may include the functionality of an activity tracker or panic button.
- the local hub 104 searches for presence of the wearable 112 .
- the authentication can be as simple as using the unique Bluetooth identifier that every device has to actually installing a crypto key inside the wearable 112 . If the local hub 104 does not “see” the authorized wearable in proximity of the local hub 104 , the reading is flagged as suspect. Any communication from the local hub 104 can also be locked or deactivated when the authorized wearable 112 is not in range of the local hub 104 . This will prevent non-authorized users from accessing potentially sensitive medical information.
- local hub 104 Periodically, local hub 104 preferably reports a list of all identifiers for monitoring devices 102 a - 102 n that are in communication with local hub 104 to device management server 106 at regular intervals. Only approved devices and authorized Bluetooth medical devices are allowed to send data local hub 104 . If remote management server 106 detects data received from a non-approved device, that data is flagged for further review by a clinician.
- device management server 106 provides a unique whitelist of approved identifiers and only monitoring devices 102 a - 102 n with identifiers in the whitelist are allowed to communication with device management server 106 . This is referred to as “pairing” and is managed using a clinical application 110 or device management server 106 .
- two remote applications control or communicate with local hub 104 .
- a first clinical application is utilized to control where vital sign data is sent and where the unique patient information is stored.
- a device management application that controls the configuration (pairing BLE vital measurement equipment), cellular and WiFi settings, handles all aspects of security such as authentication and location challenges. The device management application is will shut down or restrict use if a security breach is suspected.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Medical Informatics (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Public Health (AREA)
- Epidemiology (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Pathology (AREA)
- Measuring And Recording Apparatus For Diagnosis (AREA)
Abstract
Description
Claims (8)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/740,776 US12192357B2 (en) | 2021-05-10 | 2022-05-10 | Device and location authentication for secure patient monitoring |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202163186495P | 2021-05-10 | 2021-05-10 | |
| US17/740,776 US12192357B2 (en) | 2021-05-10 | 2022-05-10 | Device and location authentication for secure patient monitoring |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20220360444A1 US20220360444A1 (en) | 2022-11-10 |
| US12192357B2 true US12192357B2 (en) | 2025-01-07 |
Family
ID=83901689
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US17/740,776 Active 2043-03-24 US12192357B2 (en) | 2021-05-10 | 2022-05-10 | Device and location authentication for secure patient monitoring |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US12192357B2 (en) |
Citations (25)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100228977A1 (en) * | 2009-03-04 | 2010-09-09 | Jim Sievert | Communications Hub for Use in Life Critical Network |
| US20130268444A1 (en) * | 2010-05-28 | 2013-10-10 | Jong Namgoong | Three-factor user authentication method for generating otp using iris information and secure mutual authentication system using otp authentication module of wireless communication terminal |
| US20140229339A1 (en) * | 2011-05-25 | 2014-08-14 | Orange | Method of using a user device for remote payment of a shopping basket on a merchant server, and an associated system |
| US20150286791A1 (en) * | 2011-04-28 | 2015-10-08 | Tiatros Inc. | System and method for uploading and sharing medical images within trusted health-user communities |
| US20160095146A1 (en) * | 2014-09-30 | 2016-03-31 | Brother Kogyo Kabushiki Kaisha | Information processing apparatus |
| US9832649B1 (en) * | 2011-10-12 | 2017-11-28 | Technology Business Management, Limted | Secure ID authentication |
| US20190082968A1 (en) * | 2017-09-15 | 2019-03-21 | Prasad Karnik | System and method of continuous health monitoring |
| US20200387887A1 (en) * | 2020-08-13 | 2020-12-10 | Yogesh Rathod | Selected place on maps associated uniform resource locator (URL) or selected place associated merchant account based payment transactions, connections, offers, order, deals, reservation and call-to-actions |
| US20210019541A1 (en) * | 2019-07-18 | 2021-01-21 | Qualcomm Incorporated | Technologies for transferring visual attributes to images |
| US20210118579A1 (en) * | 2019-10-21 | 2021-04-22 | Singapore Ministry of Heath Office for Healthcare Transformation | System and method for secure, private, and trusted medical information monitoring and semi-autonomous prescription management |
| US20210196406A1 (en) * | 2019-12-31 | 2021-07-01 | Stryker Corporation | Operating devices in an operating room |
| US20210407668A1 (en) * | 2017-02-28 | 2021-12-30 | 19Labs, Inc. | Systems and methods for maintaining privacy and security while real time monitoring a plurality of patients over the internet |
| US20220070666A1 (en) * | 2020-08-31 | 2022-03-03 | Abbott Diabetes Care Inc. | Secured communications in medical monitoring systems |
| US20230059887A1 (en) * | 2020-02-06 | 2023-02-23 | Nec Corporation | Authentication device, authentication method, and recording medium |
| US20230093580A1 (en) * | 2012-10-25 | 2023-03-23 | Edward J. Gaudet | Secure content sharing |
| US11615257B2 (en) * | 2017-02-24 | 2023-03-28 | Endotronix, Inc. | Method for communicating with implant devices |
| US20230116997A1 (en) * | 2016-03-31 | 2023-04-20 | Dexcom, Inc. | Methods for providing an alert or an alarm to a user of a mobile communications device |
| US20230171302A1 (en) * | 2012-09-22 | 2023-06-01 | Google Llc | Subscription-notification mechanisms for synchronization of distributed states |
| US20230208626A1 (en) * | 2018-03-16 | 2023-06-29 | Iot And M2M Technologies, Llc | Configuration Systems and Methods for Secure Operation of Networked Transducers |
| US20230215530A1 (en) * | 2012-01-10 | 2023-07-06 | Cerner Innovation, Inc. | Proximity-based mobile-device updates of electronic health records |
| US20230231931A1 (en) * | 2020-06-03 | 2023-07-20 | Gambro Lundia Ab | Digital communication module for a self-contained medical device communication platform |
| US20230254378A1 (en) * | 2015-03-30 | 2023-08-10 | Zoll Medical Corporation | Medical device management |
| US11769577B1 (en) * | 2020-01-15 | 2023-09-26 | Ledgerdomain Inc. | Decentralized identity authentication framework for distributed data |
| US20230380701A1 (en) * | 2020-03-20 | 2023-11-30 | Masimo Corporation | Remote patient management and monitoring systems and methods |
| US20240048591A1 (en) * | 2019-03-06 | 2024-02-08 | Carefusion 303, Inc. | Automatic network provisioning of a medical device |
-
2022
- 2022-05-10 US US17/740,776 patent/US12192357B2/en active Active
Patent Citations (25)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100228977A1 (en) * | 2009-03-04 | 2010-09-09 | Jim Sievert | Communications Hub for Use in Life Critical Network |
| US20130268444A1 (en) * | 2010-05-28 | 2013-10-10 | Jong Namgoong | Three-factor user authentication method for generating otp using iris information and secure mutual authentication system using otp authentication module of wireless communication terminal |
| US20150286791A1 (en) * | 2011-04-28 | 2015-10-08 | Tiatros Inc. | System and method for uploading and sharing medical images within trusted health-user communities |
| US20140229339A1 (en) * | 2011-05-25 | 2014-08-14 | Orange | Method of using a user device for remote payment of a shopping basket on a merchant server, and an associated system |
| US9832649B1 (en) * | 2011-10-12 | 2017-11-28 | Technology Business Management, Limted | Secure ID authentication |
| US20230215530A1 (en) * | 2012-01-10 | 2023-07-06 | Cerner Innovation, Inc. | Proximity-based mobile-device updates of electronic health records |
| US20230171302A1 (en) * | 2012-09-22 | 2023-06-01 | Google Llc | Subscription-notification mechanisms for synchronization of distributed states |
| US20230093580A1 (en) * | 2012-10-25 | 2023-03-23 | Edward J. Gaudet | Secure content sharing |
| US20160095146A1 (en) * | 2014-09-30 | 2016-03-31 | Brother Kogyo Kabushiki Kaisha | Information processing apparatus |
| US20230254378A1 (en) * | 2015-03-30 | 2023-08-10 | Zoll Medical Corporation | Medical device management |
| US20230116997A1 (en) * | 2016-03-31 | 2023-04-20 | Dexcom, Inc. | Methods for providing an alert or an alarm to a user of a mobile communications device |
| US11615257B2 (en) * | 2017-02-24 | 2023-03-28 | Endotronix, Inc. | Method for communicating with implant devices |
| US20210407668A1 (en) * | 2017-02-28 | 2021-12-30 | 19Labs, Inc. | Systems and methods for maintaining privacy and security while real time monitoring a plurality of patients over the internet |
| US20190082968A1 (en) * | 2017-09-15 | 2019-03-21 | Prasad Karnik | System and method of continuous health monitoring |
| US20230208626A1 (en) * | 2018-03-16 | 2023-06-29 | Iot And M2M Technologies, Llc | Configuration Systems and Methods for Secure Operation of Networked Transducers |
| US20240048591A1 (en) * | 2019-03-06 | 2024-02-08 | Carefusion 303, Inc. | Automatic network provisioning of a medical device |
| US20210019541A1 (en) * | 2019-07-18 | 2021-01-21 | Qualcomm Incorporated | Technologies for transferring visual attributes to images |
| US20210118579A1 (en) * | 2019-10-21 | 2021-04-22 | Singapore Ministry of Heath Office for Healthcare Transformation | System and method for secure, private, and trusted medical information monitoring and semi-autonomous prescription management |
| US20210196406A1 (en) * | 2019-12-31 | 2021-07-01 | Stryker Corporation | Operating devices in an operating room |
| US11769577B1 (en) * | 2020-01-15 | 2023-09-26 | Ledgerdomain Inc. | Decentralized identity authentication framework for distributed data |
| US20230059887A1 (en) * | 2020-02-06 | 2023-02-23 | Nec Corporation | Authentication device, authentication method, and recording medium |
| US20230380701A1 (en) * | 2020-03-20 | 2023-11-30 | Masimo Corporation | Remote patient management and monitoring systems and methods |
| US20230231931A1 (en) * | 2020-06-03 | 2023-07-20 | Gambro Lundia Ab | Digital communication module for a self-contained medical device communication platform |
| US20200387887A1 (en) * | 2020-08-13 | 2020-12-10 | Yogesh Rathod | Selected place on maps associated uniform resource locator (URL) or selected place associated merchant account based payment transactions, connections, offers, order, deals, reservation and call-to-actions |
| US20220070666A1 (en) * | 2020-08-31 | 2022-03-03 | Abbott Diabetes Care Inc. | Secured communications in medical monitoring systems |
Also Published As
| Publication number | Publication date |
|---|---|
| US20220360444A1 (en) | 2022-11-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20240267413A1 (en) | Personal device network for user identification and authentication | |
| US20240406719A1 (en) | System and Method for Secure Communication with a Network Device | |
| JP7361703B2 (en) | Device pairing system and method, and device communication control system and method | |
| Sawand et al. | Toward energy-efficient and trustworthy eHealth monitoring system | |
| US20140337950A1 (en) | Method and Apparatus for Secure Communications in a Wireless Network | |
| EP3085020B1 (en) | Security gateway for a regional/home network | |
| KR101328779B1 (en) | Mobile terminal, server and information providing method using the same | |
| US20170372600A1 (en) | Method, apparatus, and computer program product for local control through intermediate device | |
| US12279115B2 (en) | Instant secure wireless network setup | |
| CN110958142A (en) | Device maintenance method, maintenance device, storage medium, and computer program product | |
| CN107409145A (en) | Method, device and computer program product for local control via middleware | |
| US11178540B2 (en) | Enabling secure beacon telemetry broadcasts based on battery power state of a beacon device | |
| US12177195B2 (en) | Network transport independent encrypted sensor data transport system and methods | |
| CN102014378A (en) | Method and system for detecting rogue access point device and access point device | |
| US11336621B2 (en) | WiFiwall | |
| US12192357B2 (en) | Device and location authentication for secure patient monitoring | |
| KR20120084630A (en) | Authentication system and method based by positioning information | |
| JP2021511847A (en) | Protect headless devices from malicious (re) configurations | |
| US10779166B2 (en) | Technique for controlling access to a radio access network | |
| US20240179532A1 (en) | Privacy Preserving Bluetooth Low Energy Pairing | |
| US20200034567A1 (en) | Data communication network | |
| CN106878989B (en) | Access control method and device | |
| Kouvatsos et al. | Performance issues in a secure health monitoring wireless sensor network | |
| US20230328054A1 (en) | Autonomous control and secure communications system and methods for sensors | |
| US20160352716A1 (en) | Authentication system, authentication method, server device, and client device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| AS | Assignment |
Owner name: ANELTO, INC., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:REIMAN, MICHAEL JAMES;HENKE, ROY WILLIAM;CONSTIEN, SCOTT D.;REEL/FRAME:064807/0884 Effective date: 20220510 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| AS | Assignment |
Owner name: TCW ASSET MANAGEMENT COMPANY LLC, AS COLLATERAL AGENT, MASSACHUSETTS Free format text: SECURITY INTEREST;ASSIGNORS:LIFELINE SYSTEMS COMPANY;ANELTO, INC.;100PLUS, INC.;AND OTHERS;REEL/FRAME:069164/0414 Effective date: 20241011 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |